Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Non-equal multi-user high order modulation approach

A high-order modulation and multi-user technology, applied in the field of communication, can solve the problems of limiting performance, multiple access interference of users with good channels, and reducing the performance of users with good channels, so as to achieve the effect of enhancing throughput efficiency and improving performance

Inactive Publication Date: 2007-09-26
PANASONIC CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, simply increasing the transmit power of users with poor channels improves the performance of poor users, but it also causes additional multiple access interference to users with good channels, which reduces the performance of users with good channels, so that the overall performance cannot be improved. Throughput efficiency, especially for Code Division Multiple Access (CDMA) systems limited by Multiple Access Interference (MAI)
[0005] Figure 5 shows the traditional multi-user high-order modulation multiple access de-access receiving process, each user performs separate multiple-access de-access, high-order demodulation, parallel-to-serial conversion, de-interleaving and decoding, where Power control technology is not organically combined with high-order modulation technology, which limits its performance improvement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-equal multi-user high order modulation approach
  • Non-equal multi-user high order modulation approach
  • Non-equal multi-user high order modulation approach

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Suppose there are two users A and B, user A is at the edge of the cell, its SINR is low, and user B is close to the base station, its SINR is high. The base station defines user A as a weak user and user B as a strong user according to the SINR of each user. Assume that the binary data block of user A after channel coding and interleaving is {a i}, i ∈ [0, N-1]. The binary data block of user B after channel coding and interleaving is {b i}, i ∈ [0, N-1]. Wherein, N is the block length, N=0 (mod 3). The multi-user bit data stream after matching multiplexing is {c i}, i ∈ [0, 2N-1]. When Gray-mapped 8PSK is used, the following multiplexing methods can be used:

[0061] c 3k =a k c 3k+2 =b k k ∈ [ 0 , 2 N 3 - 1 ]

[0062] c 3i+1 =a i+2N / 3 c 3i+N+1 =b i+2N / 3 i ...

Embodiment 2

[0065] Suppose there are two users A and B, user A is at the edge of the cell, its SINR is low, and user B is close to the base station, its SINR is high. The base station defines user A as a weak user and user B as a strong user according to the SINR of each user. Assume that the binary data block of user A after channel coding and interleaving is {a i}, i ∈ [0, N-1]. The binary data block of user B after channel coding and interleaving is {b i}, i ∈ [0, N-1]. Wherein, N is the block length, N=0 (mod 2). The multi-user bit data stream after matching multiplexing is {c i}, i ∈ [0, 2N-1]. When Gray-mapped 16QAM is used, the following multiplexing method can be used:

[0066] c 4k =a k c 4k+2 =a k+N / 2 c 4k+1 =b k c 4k+3 =b k+N / 2 k ∈ [ 0 , N 2 - 1 ]

[0067] then to {c i} Each group of four bits is mapped to the constellation d...

Embodiment 3

[0069] Assume that there are three users A, B and C, and their SINRs increase sequentially. According to the SINR of each user, the base station defines user A as a weak user, user C as a strong user, and user B in the middle. Assume that the binary data blocks of users A, B, and C after channel coding and interleaving are respectively {a i}, {b i}, {c i}, i ∈ [0, N-1]. Wherein, N is the block length, N=0 (mod2). The multi-user bit data stream after matching multiplexing is {d i}, i ∈ [0, 3N-1]. When Gray-mapped 64QAM is used, the following multiplexing method can be used:

[0070] d k =a k d k+3 =a k+N / 2 d k+4 =b k

[0071] d k+1 =b k+N / 2 d k+2 = c k d k+5 = c k+N / 2 k ∈ [ 0 , N 2 - 1 ]

[0072] then to {d i} Each group of six bits is mapped to the constellation diagram of 64QAM for transmission.

[007...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The non-uniform multi-user high-order modulating method comprises: coding and interlacing the source data from different user to generate multiple sequence; according to feedback user channel state, ordering users; according to protective capacity level, ordering signal bit in the modulation symbol; then, according to former symbol bit number and user number, dividing both the symbol bit and user into one-to-one correspondence bit set and user set; matching and multiplexing the interlace code data sequence with good / poor channel state to the symbol bit set with weak / strong protective capacity, respectively; forming a modulation symbol by parallel symbol bits to generate modulation symbol sequence; and accessing multiple-address to the modulation symbol sequence to generate multiple access transmission data sequence.

Description

technical field [0001] The invention relates to a modulation technique for multi-user transmission in the communication field. In particular, design an unequal multi-user high-order modulation method Background technique [0002] Binary Phase Shift Keying (BPSK) and Quadrature Phase Shift Keying (QPSK) are commonly used modulation techniques in the communication field. In order to further improve the spectral efficiency, high-order modulation techniques such as 8PSK, 16QAM, 64QAM and 256QAM have been introduced [Document 14: Stephen G. Wilson, DigitalModulation and Coding, Prentice-Hall, 1996]. In the constellation diagram of high-order modulation, each modulation symbol is composed of several bits, such as the modulation symbols of 8PSK, 16QAM, 64QAM and 256QAM are composed of 3, 4, 6 and 8 bits respectively. In order to reduce the bit error rate, the mapping from the bit string to the modulation symbol usually adopts Golay mapping. Figure 1 shows the constellation map o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L27/00H04L5/02
CPCH04L5/0044H04L5/006H04L5/0037
Inventor 吴湛击李继峰
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products